Best storm preparation is communication

There is nothing worse for a company and its customers than being forced to close because of inclement weather. And with winter almost upon us once again, now is a good time to make sure your business continuity plan is prepared for anything and everything mother nature is looking to throw your way.

Attackers can access Dropbox, Google Drive, OneDrive files without a user’s password

The so-called "man-in-the-cloud" attack is said to be a common flaw in most cloud-based file synchronization services.

Hackers don't even need your password anymore to get access to your cloud data. Newly published research, released at the Black Hat conference in Las Vegas on Wednesday by security firm Imperva, shows how a "man-in-the-cloud" attack can grab cloud-based files -- as well as infecting users with malware -- without users even noticing.

Word of the Day: Evil Twin

By: Sarah Todoroff, Content and Social Media Manager
In fictional stories the evil twin is the antagonist of the story. A physical copy of the protagonist but with a radically inverted morality. In security, an evil twin is a term for a rogue Wi-Fi access point (antagonist) that appears to be a legitimate one (protagonist) offered on the premises.

FREAK SSL FLAW: Who’s going to get the fix first?

A new web crypto bug, disclosed Tuesday, is affecting many Safari and Android users. So between Apple and Google, who is going to send out the bug fix first?
What is it?  
The FREAK bug is the latest vulnerabilities affecting the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols used to encrypt traffic between an HTTPS website and a browser.